Method for preventing key share attacks

a key share and attack technology, applied in the field of key share attack prevention, can solve the problems of inability to prevent on-line attacks, protocol variants that cannot be considered minor variants of sts, and protocol security attributes that are lacking, so as to minimize an on-line uks attack against a responder

Inactive Publication Date: 2005-02-01
MALIKIE INNOVATIONS LTD
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

According to one aspect of the invention, there is provided in an STS-MAC protocol, including one of the entities A sending its certificate CertA in a first flow to thereby minimize an on-line UKS attack against a responder B.

Problems solved by technology

It should be noted, however, that these protocols cannot be considered minor variants of STS.
For this reason, the above hypothetical scenario (in particular, the assumption that no further authentication is performed after termination of the key agreement protocol) is realistic if an AKC protocol is used (since key confirmation has already been provided), an unrealistic if an AK protocol is used (since key confirmation has not yet been provided).
Hence, unlike the case of public key substitution attacks, the on-line attacks cannot be prevented by requiring that entities prove to the certificate-issuing authority possession of the private keys corresponding to their public keys during the certification process.
The applicants have discovered that the STS protocols have some security attributes that are lacking.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for preventing key share attacks
  • Method for preventing key share attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

Referring to FIG. 1, an electronic communication system 10 includes a pair of correspondents, A and B, designated as a sender 12 and recipient 14, connected by a communication channel 16. Each of the correspondents 12 and 14 includes an encryption unit 18 and 20 respectively that may process information and prepare it for transmission through the channel 16. A third entity 22 is depicted as the adversary.

In a key establishment / agreement protocol, according to the embodiment of the present invention, the following flow of messages take place between the entities:

Item 1.

(1) A→E A,αrA (2) A←B CertB, αrB,SB(2,B,A,αrB,αrA),MACK(SB(2,B,A,αrB,αrA))(3) A→B CertA, SA(3,A,B,αrA,αrB),MACK(SA(3,A,B,αrA,αrB))

In the original STS-MAC protocol described in the background section and the modification presented above, the agreed key K is used as the MAC key for the purpose of providing explicit key confirmation. A passive adversary now has some information about K, namely the MAC of a known message u...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A key agreement protocol for preventing key-share attacks wherein a method is provided for establishing a common shared key between a pair of correspondents in a station-to-station protocol by exchanging messages between the correspondents and including identification information in said messages, the information being identifiable to one or other of said correspondents to thereby establish said common key.

Description

This invention relates to cryptographic systems and in particular, to improvements in key agreement protocols for preventing key-share attacks thereon.BACKGROUND OF THE INVENTIONKey establishment is the process by which two (or more) entities establish a shared secret key.The key is subsequently used to achieve some cryptographic goal, such as confidentiality or data integrity. Ideally, the established key should have precisely the same attributes as a key established face-to-face it should be distributed uniformly at random from the key space, and no unauthorized (and computationally bounded) entity should learn anything about the key.Broadly speaking, there are two kinds of key establishment protocols: key transport protocols in which a key is created by one entity and securely transmitted to the second entity, and key agreement protocols in which both parties contribute information which jointly establish the shared secret key.Let A and B be two honest entities, i.e., legitimate ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(United States)
IPC IPC(8): H04L9/08
CPCH04L9/08H04L9/0844
Inventor MENEZES, ALFRED J.BLAKE-WILSON, SIMON
Owner MALIKIE INNOVATIONS LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products